USB Reloaded USB Reloaded: The Teensy Attack Eric Conrad

Slides:



Advertisements
Similar presentations
Basic Computer Vocabulary
Advertisements

GHOST glibc gethostbyname() Vulnerability CVE Johannes B. Ullrich, Ph.D. SANS Technology Institute
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Windows Computers Akash Patel.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
ETT 429 Spring 2007 Hardware/Software Basics. Agenda Technology Standards Review Technology Standards Review Results of Technology Self Assessment Results.
Hubert Kairuki Memorial University Kaizilege Karoma.
IS Fall 2009 Chapter 3 9/2/2009. Epidemics and Health H1N1 – Younger are more at risk – Easily spread in crowds (like classes) Two of your lowest.
Operating Systems Concepts 1. A Computer Model An operating system has to deal with the fact that a computer is made up of a CPU, random access memory.
A Quick Review of Unit 1 – Recognizing Computers Computing Fundamentals © CCI Learning Solutions.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
An Introduction to Operating Systems. Definition  An Operating System, or OS, is low-level software that enables a user and higher-level application.
CHAPTER 2 Input & Output Prepared by: Mrs.sara salih 1.
Operating Systems Chapter 4.
Copyright Security-Assessment.com 2004 New Technology Enforcement Strategies by Peter Benson.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
Adrian Crenshaw.  I run Irongeek.com  I have an interest in InfoSec education  I don’t know everything - I’m.
eScan Total Security Suite with Cloud Security
Section 2.1 Identify hardware Describe processing components Compare and contrast input and output devices Compare and contrast storage devices Section.
Types of Computers Desktop / Laptop PC / Mac Client / Server.
Chapter 3.1:Operating Systems Concepts 1. A Computer Model An operating system has to deal with the fact that a computer is made up of a CPU, random access.
Fundamentals of Networking Discovery 1, Chapter 2 Operating Systems.
Configuring the MagicInfo Pro Display
Hands-On Microsoft Windows Server 2008
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Guide to Linux Installation and Administration, 2e1 Chapter 3 Installing Linux.
Windows Internet Explorer 9 Chapter 1 Introduction to Internet Explorer.
2-3 note. 2 Peripheral Devices “Peripheral devices” are hardware plugged into ports or connected to a computer wirelessly. These devices can be for input,
Lecture 2 “Structure of computer” Informatics. Computer is  general purpose device that can be programmed to carry out a set of arithmetic or logical.
WINDOWS Part 1 – Start Up Basics
Chapter 5: Defining the Role of the Operating System
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Retina Network Security Scanner
1 Computer Maintenance Software Configuration: Evaluating Software Packages, Software Licensing, and Computer Protection through the Installation and Maintenance.
Business Technology Applications Computer Basics Vocab.
Lecture (7) Systems software and Application Software.Systems software and Application Software. Dr:Emad Elsharkawy Eng-Omar Salah Dr:Emad Elsharkawy 1.
The SELinux of First Look. Prologue After many discussions with a lot of Linux users, I’ve come to realize that most of them seem to disable SELinux rather.
Copy to Tape TOI. 2 Copy to Tape TOI Agenda Overview1 Technical Feature Implementation2 Q&A3.
©2015 HEAT Software. All rights reserved. Proprietary & Confidential. Ransomware: How to Avoid Extortion Matthew Walker – VP Northern Europe.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
2: Operating Systems Networking for Home & Small Business.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
How to Recover Deleted Photos from Android Cell Phone? Android is keeping on improving their products and make sure to provide the best software service.
Vulnerabilities in Operating Systems Michael Gaydeski COSC December 2008.
Mac Notes PIT Ellen Zimmerman Master Technology Teacher.
Billy Ripple Dr. Oblitey COSC  File-Sharing ◦ What is it? ◦ Uses ◦ History ◦ Types ◦ Dangers  Case Study  Summary  Works Cited.
NEXT GENERATION ATTACKS & EXPLOIT MITIGATIONS TECHNIQUES ID No: 1071 Name: Karthik GK ID: College: Sathyabama university.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Windows Vista Configuration MCTS : Network Security.
Windows Server 2003 { First Steps and Administration} Benedikt Riedel MCSE + Messaging
Lesson 4 Software: Systems and Applicatio n Software CREATED BY MOBIN 2016.
Computer Maintenance Software Configuration: Evaluating Software Packages, Software Licensing, and Computer Protection through the Installation and Maintenance.
WannaCry/WannaCrypt Ransomware
Introduction to Computers Mrs. Gambucci
Section 2.1 Section 2.2 Identify hardware
Guide to Linux Installation and Administration, 2e
Computer Basics: Parts of a Computer? Part I
CompTIA Server+ Certification (Exam SK0-004)
oVirt Node Project Douglas Schilling Landgraf
Programming with Arduinos and Rapsberry Pi
forgot laptop password Windows 10 with no reset disk
Nessus Vulnerability Scanning
Computer Maintenance Software Configuration: Evaluating Software Packages, Software Licensing, and Computer Protection through the Installation and Maintenance.
Information Security Session October 24, 2005
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Radoslaw Jedynak, PhD Poland, Technical University of Radom
Network hardening Chapter 14.
Presentation transcript:

USB Reloaded USB Reloaded: The Teensy Attack Eric Conrad

USB Reloaded A Quick Note This talk was presented The SANS360: Top Security Takeaways –10 speakers, each given 360 seconds –See: –So this slide deck is designed for speed Technical details (such as code) are omitted here –See: for more technical details about the Teensy attack

USB Reloaded It's Baaaaack We mitigated the USB attack vector –Right? –Malware launched via autorun.inf on USB flash media is mitigated by KB , , etc.

USB Reloaded There's More Than One Way to Do it USB Flash media is just one of many USB technologies Another is USB Human Interface Device (HID) –AKA a USB Keyboard/Mouse –These can be programmed to deliver keystrokes and mouse movements

USB Reloaded Which is Which? This is a disk This is a keyboard

USB Reloaded Meet Teensy "The Teensy is a complete USB-based microcontroller development system, in a very small footprint, capable of implementing many types of projects." Source: This is a keyboard

USB Reloaded How Much Data Can a Teensy Store? Teensy 2.0: 2560 bytes Teensy++ 2.0: 8192 bytes Teensy++ 2.0: 8192 bytes + 2 gigs SD storage

USB Reloaded Keyboard vs. Keyboard This is USB a keyboard This is also a USB keyboard Both can send keystrokes

USB Reloaded What can you do With Keystrokes? Run any command the logged in user can execute –Disable the firewall and enable services –Surf to a website, download a malicious payload and execute it Type an encoded Metasploit payload into a file, convert to exe and execute it –No network connectivity required –Air-gapped network FTW!

USB Reloaded What This Means This still works: Patching doesn't (currently) mitigate this risk [1] How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History, Kim Zetter, Wired Magazine, July

USB Reloaded How Bad Could it Be? Question: what is vulnerable? –Answer: any logged-in system that allows a HID to send keystrokes, without requiring any interaction beyond insertion Follow-up question: what OSs allow that by default? –Let's find out!

USB Reloaded Let's Play… Will it PWN? The rules: –The goal: display a harmless message on the target system by inserting a pre-programmed Teensy USB device –Will also execute "uname –a" (or equivalent) –Attacker may insert the USB only: no other (human) system interaction is allowed –All target OSs are the most recent release, with default settings

USB Reloaded Meet Beensii USB + Teensy + ASCII == Beensii, our mascot If Beensii displays, the system is PWNed || || || ______________________ || || / \ || || / All your USB Ports | / | | | / Are belong to me | | o o | | | | __ | ---\__________________________/

USB Reloaded Ubuntu Linux Server 11.10: Will it PWN?

USB Reloaded It PWNs!

USB Reloaded FreeBSD 9.0: Will it PWN?

USB Reloaded It PWNS!

USB Reloaded Fedora Linux 16: Will it PWN?

USB Reloaded It PWNs!

USB Reloaded Windows 7: Will it PWN?

USB Reloaded It PWNs!

USB Reloaded Mac OS X Lion: Will it PWN?

USB Reloaded It PWNs!

USB Reloaded OpenBSD 5.0: Will it PWN?

USB Reloaded It PWNs!!

USB Reloaded Mitigation Options Restricting HIDs to known VIDs (Vendor IDs) and PIDs (Product IDs) is one option Logitech MK 320 Wireless Keyboard VID: 046D PID:C52E

USB Reloaded Beensii Strikes Again A Teensy can be programmed with any VID/PID –If the VID/PID isn't known, common VIDs/PIDs can be guessed

USB Reloaded More Mitigation Options Other values, such as the unique serial number, may be tracked or blocked. But these are often left blank by the vendor Blank serial number Software: USBDeview, from NirSoft

USB Reloaded Mitigation Continued Consider restricting the installation of HIDs –Microsoft TechNet Article "Prevent Installation of Removable Devices" Adrian Crenshaw's Shmoocon talk Plug and Prey: Malicious USB Devices has more mitigation recommendations Links to both (and a copy of this presentation) at In secure environments, use only HIDs that include values such as unique serial number, and lock systems down to each specific HID

USB Reloaded References _____________________________________________________ || || / \ || || | I'd like to thank the following folks for making me | || || | possible: | || || | | || || | ( | || || | | || || | ( | || || | | || || | Paul and Robin at | || || | | || || | Astrobaby: | || || | | || || | Adrian Crenshaw: | | | | | | And Emma Conrad, for the photography and nifty | | o o | | red hat she made for Tux | | __ | \_____________________________________________________/

USB Reloaded Thank You! || || || ________________________________ || || / \ || || | Go to to \ || || | \ || || | download a copy of this | || || | | || || | presentation, get more info | || || | | || || | on mitigation options, and | || || | | || || | download the code used | | | | | | in this presentation. | | o o | /\__________________________________/ | __ |